Press ESC to close or Enter to search

Home
About Us
Services
Pricing
Tools
Resources
Contact
Get Started
Live Security Feed
Your IPDetecting...
NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025 NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025
View Dashboard
Defence & Aerospace Specialists

IT Support for Defence & Aerospace Supply Chain

Specialist managed IT services for defence contractors, aerospace suppliers, engineering firms, and government supply chain. BPSS cleared staff, UK data residency, and deep understanding of MOD cyber requirements.

CAF Aligned
Verified
Cyber Essentials Plus
Certified
BPSS Cleared
Verified
UK Data Residency
Guaranteed

Defence Supply Chain Cyber Requirements Are Getting Serious

If you're in the defence, aerospace, or government supply chain in the Thames Valley, you already know the landscape is changing. Prime contractors are flowing down cyber security requirements more aggressively than ever. MOD contracts now mandate specific security controls. And the consequences of getting it wrong aren't just failed audits—they're lost contracts and damaged relationships with primes.

Most MSPs don't understand this world. They've never heard of Def Stan 05-138, don't know the difference between DEFCON 658 and 659, and couldn't explain the Cyber Security Model risk profiles if their business depended on it.

We're different. Based in Reading, we work with defence and aerospace suppliers across Berkshire and the wider South East. We understand the compliance requirements being flowed down from primes, and build IT environments that pass supplier assurance questionnaires without scrambling at the last minute. Our cyber security services are specifically designed with regulated sectors in mind. Want to check your current posture? Try our free domain health check or compliance checker.

Sectors We Support

Defence Contractors
Aerospace Suppliers
Government Supply Chain
Engineering & Manufacturing
Aviation & Fuel
Critical National Infrastructure

Defence & Aerospace Cyber Requirements

The frameworks, standards, and contract clauses you need to understand and comply with.

Cyber Security Model (CSM)

MOD Standard

The CSM replaced the Defence Cyber Protection Partnership (DCPP) as the MOD's approach to managing supply chain cyber risk. It assigns risk profiles from Very Low to Very High based on the sensitivity of information and systems you handle.

Risk Assessment
Control Mapping
Evidence Pack

Def Stan 05-138

Defence Standard

The definitive MOD standard for cyber security in defence suppliers. Defines security requirements across people, processes, and technology. Increasingly referenced in contracts and supplier assurance questionnaires.

Personnel Security
Physical Security
Cyber Security

DEFCON 658 & 659

Contract Clauses

Standard MOD contract clauses for cyber security. DEFCON 658 covers cyber risk management requirements, while DEFCON 659 addresses flow-down to subcontractors. If these are in your contract, you need compliant IT.

Flow-Down
Incident Reporting
Right to Audit

JOSCAR

Pre-Qualification

Joint Supply Chain Accreditation Register—the common supplier pre-qualification system used by BAE Systems, Rolls-Royce, Leonardo, MBDA, and other major primes. Includes detailed cyber security questionnaires.

Cyber Questionnaire
Annual Renewal
Evidence Upload

AS9100 / AS9110 / AS9120

Aerospace Quality

Aerospace quality management standards with specific IT and information security requirements. AS9100 for manufacturers, AS9110 for MRO, AS9120 for distributors. Your QMS needs compliant IT underpinning.

Document Control
Configuration Mgmt
Traceability

ITAR / EAR Awareness

Export Controls

US export control regulations that apply if you handle US-origin defence articles or technical data. ITAR violations carry severe penalties. Your IT environment must prevent unauthorised foreign access.

Access Control
Data Segregation
Audit Trails

Cyber Security Model Risk Profiles

The MOD's CSM assigns risk profiles based on the sensitivity of MOD information and systems you handle. Higher risk profiles require more stringent controls.

Risk Profile Typical Scenarios Minimum Baseline
Very Low No access to MOD information or systems Basic cyber hygiene
Low OFFICIAL information, no MOD system access Cyber Essentials
Moderate OFFICIAL-SENSITIVE, limited MOD connectivity Cyber Essentials Plus
High Critical systems, significant MOD integration CE+ plus additional controls
Very High National security implications, SECRET+ Bespoke security regime

IT Services Built for Defence Supply Chain

Everything you need to run secure, compliant IT operations that satisfy your primes and pass supplier audits.

Cyber Essentials & CE+ Certification

We manage your annual Cyber Essentials certification process, maintain compliant configurations year-round, and handle the technical evidence pack for auditors.

24/7 Security Monitoring

SOC partnership providing continuous threat detection, EDR across all endpoints, and rapid incident response with defined escalation procedures.

UK Data Residency

All data stays in UK jurisdiction. UK-based cloud infrastructure, UK backup locations, and no offshore support centres accessing your environment.

BPSS Cleared Staff

All UK-based staff hold BPSS clearance as standard. Where contracts require SC or DV clearance, we can support the sponsorship process through appropriate channels.

Compliance Documentation

We help you build and maintain the evidence packs, policy documents, and audit trails that primes and assessors require.

Secure Data Handling

OFFICIAL and OFFICIAL-SENSITIVE handling procedures, encryption at rest and in transit, secure disposal, and classification-aware access controls.

Backup & Disaster Recovery

UK-based encrypted backups, defined RTO/RPO targets, regular restore testing, and documented business continuity procedures.

Incident Response

Documented playbooks, severity-based escalation, client notification SLAs that meet prime contractor requirements, and post-incident reviews.

Supplier Questionnaire Support

We help you complete JOSCAR, prime-specific SAQs, and due diligence questionnaires with accurate, evidenced responses.

Why Defence Contractors Choose Us

Most MSPs treat defence like any other sector. We understand what makes it different.

1

We Speak Your Language

We understand CSM risk profiles, DEFCON clauses, JOSCAR questionnaires, and the difference between OFFICIAL and OFFICIAL-SENSITIVE. You won't need to explain basic concepts or translate requirements.

2

Already Compliant Ourselves

We're Cyber Essentials Plus certified, CAF aligned, and working toward ISO 27001. We don't just help you comply—we demonstrate compliance in our own operations.

3

UK Through and Through

British owned, UK-based staff only, UK data centres. No offshore support, no foreign parent company complications, no data leaving UK jurisdiction.

4

BPSS Cleared Team

Our UK-based staff already hold BPSS clearance. Where your contracts require SC or higher, we can work with you through the sponsorship process to obtain the necessary clearances.

5

Audit-Ready Documentation

We help you build and maintain the evidence packs that primes demand. When the supplier assurance questionnaire lands, you'll have the answers ready.

6

Aviation & CNI Background

Direct experience in aviation fuel and critical national infrastructure gives us practical understanding of high-consequence environments where security failures aren't just expensive—they're dangerous.

Security Credentials That Matter

We don't just help clients achieve compliance—we maintain the same standards ourselves. Based in Reading, we're well positioned to support the Thames Valley's significant defence and aerospace supply chain, from precision engineering firms to specialist component manufacturers serving the major primes.

Cyber Essentials Plus

Independently verified certification demonstrating we meet the government-backed standard for cyber security controls.

CAF Aligned

Our controls are mapped to the NCSC Cyber Assessment Framework, the standard used for assessing critical national infrastructure.

ISO 27001 (Feb 2026)

Currently implementing ISO 27001:2022 with certification planned for February 2026 to provide internationally recognised assurance.

UK Data Sovereignty

All client data remains in UK jurisdiction. UK-based cloud infrastructure with UK suppliers prioritised throughout our supply chain.

Common Questions

What defence contractors and aerospace suppliers typically ask us.

Discuss Your Requirements
Yes, in most cases. Cyber Essentials is mandatory for MOD contracts involving personal information or connection to MOD systems. Most prime contractors now require CE+ as a minimum for their supply chain regardless of the specific contract wording. It's effectively table stakes for defence work.
DEFCON 658 sets out the cyber security requirements the prime contractor must meet. DEFCON 659 requires the prime to flow down appropriate cyber security requirements to their subcontractors. If you're in the supply chain, you'll typically see requirements derived from these clauses in your contracts with primes.
All our UK-based staff hold BPSS (Baseline Personnel Security Standard) clearance. We don't currently hold SC or DV clearances, but where your contracts require higher clearance levels, we can work with you through the sponsorship process. For most supply chain work handling OFFICIAL information, BPSS is sufficient.
We implement appropriate technical and procedural controls for OFFICIAL-SENSITIVE handling: encryption at rest and in transit, access controls on a need-to-know basis, audit logging, secure disposal procedures, and UK-only data residency. We help clients build the handling procedures and technical environment to meet Government Security Classifications requirements.
Absolutely. We help clients complete JOSCAR registrations and renewals, including the detailed cyber security questionnaire sections. We can provide supporting evidence, help you understand what assessors are looking for, and ensure your responses accurately reflect your security posture without over or under-stating capabilities.
We can help you build IT environments that support ITAR compliance—segregated systems, access controls preventing foreign person access, audit trails, and encryption. However, ITAR compliance is primarily a legal and procedural matter. We recommend working with specialist export control legal advisors alongside our technical implementation.

Ready to Strengthen Your Supply Chain Position?

Whether you're pursuing new MOD contracts, responding to prime contractor requirements, or preparing for supplier audits—we can help you build IT that meets the standard.

Cyber Essentials Plus Certified
Cyber Essentials Certified
Microsoft Certified Microsoft Certified
Three Best Rated Top 3 IT Services 2025